CVE-2021-33881
Published Jun 6, 2021
Last updated 3 years ago
Overview
- Description
- On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 4.2
- Impact score
- 3.6
- Exploitability score
- 0.5
- Vector string
- CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 1.9
- Impact score
- 2.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-863
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:mifare_ultralight_ev1_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13FC8374-6D01-4B5F-A95D-596AB68702E6" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:mifare_ultralight_ev1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "40001813-D7BF-4034-8907-502337123585" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:mifare_ultralight_c_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEA8BE8B-B593-48A3-A09E-A29FDC0624FC" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:mifare_ultralight_c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5B81CEC9-BE41-4193-AF43-0A26763E3054" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:mifare_ultralight_nano_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A63B6661-6124-4DA9-AB26-3BEC10554A32" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:mifare_ultralight_nano:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "17D7AEEF-C5D3-49BB-A2FC-99F1925AC89E" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:ntag_210_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C6ED991-07E5-400C-BAD3-77CCE7CC38FA" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:ntag_210:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E696E548-CD46-4AD3-92B5-E8DC36EC3612" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:ntag_212_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30D83C6E-3CC4-4964-8810-612636BECD6A" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:ntag_212:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7477739A-1485-4C9A-98F8-1BDA70590216" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:ntag_213_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E492E74-6226-4EC8-8A7B-CF7BD3F99EF7" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:ntag_213:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4D6AAD29-CDA6-4DC0-A328-085ADFC5F48B" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:ntag_215_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37047CF6-875B-4503-AA72-B35F8045F08A" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:ntag_215:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5A06E609-2E4D-40AF-9786-3C851ED21105" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:nxp:ntag_216_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5411DC55-0990-4314-8575-6F54B0F2FFD7" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:nxp:ntag_216:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FDEB5A51-A805-4B8E-939D-C5DEF22D0084" } ], "operator": "OR" } ], "operator": "AND" } ]